An Anonymity-Based Secure On-Demand Routing for Mobile Ad Hoc Networks
Authors: M. Gunasekaran, K. Premalatha
Abstract:
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) due to its unique nature such as scarce of resources and absence of centralized authority. There are number of protocols have been proposed to provide privacy and security for data communication in an adverse environment, but those protocols are compromised in many ways by the attackers. The concept of anonymity (in terms of unlinkability and unobservability) and pseudonymity has been introduced in this paper to ensure privacy and security. In this paper, a Secure Onion Throat (SOT) protocol is proposed to provide complete anonymity in an adverse environment. The SOT protocol is designed based on the combination of group signature and onion routing with ID-based encryption for route discovery. The security analysis demonstrates the performance of SOT protocol against all categories of attacks. The simulation results ensure the necessity and importance of the proposed SOT protocol in achieving such anonymity.
Keywords: Routing, anonymity, privacy, security and MANET.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337019
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2739References:
null[1] B. Epstein, C. Weinstein, and R. Cunningham, "System Adaptation as a System Response in a Tactical Ad Hoc Networks,” in Proc. IEEE International Conference on Military Communication Conference, USA, 2003, pp. 209-214.
[2] J. L. Burbank, P. F. Chimento, B. K. Haberman, and W. Kasch, "Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology,” IEEE Communications Magazine, Vol. 44, No. 11, pp. 39-45, Nov. 2006.
[3] H. Jang, Y. Lien, and T. Tsai, "Rescue Information System for Earthquake Disasters Based on MANET Emergency Communication Platform,” in Proc. of International Conference on Wireless Communications and Mobile Computing, New York, 2009, pp. 623-627.
[4] H. Miranda, and L. Rodrigues, "Preventing Selfishness in Open Mobile Ad Hoc Networks,” in Proc. 7th CaberNet Radicals Workshop, Portugal, 2002, pp. 440-445.
[5] S. Buruhanudeen, M. Othman, and B. M. Ali, "Existing MANET routing protocols and metrics used towards the efficiency and reliability- an overview,” in Proc. IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, Malaysia, 2007, pp. 231-236.
[6] F. Maan, "MANET Routing Protocols Vs Mobility Models: A performance evaluation,” in Proc. 3rd International Conference on Ubiquitous and Future Networks, Dalian, 2011, pp. 179-184.
[7] B. Kannhavong, Y. Nemoto, and N. Kato, "A Survey of Routing Attacks in Mobile Ad Hoc Networks,” IEEE Wireless Communications, Vol. 14, No. 5, pp. 85-91, Dec. 2007.
[8] L. Abusalah, Khokhar, and M. Guizani, "A Survey of Secure Mobile Ad Hoc Routing Protocols,” IEEE Communications Surveys and Tutorials, Vol. 10, No. 4, pp. 78-93, Jan. 2008.
[9] P. G. Argyroudis, and D. O’Mahony, "Secure Routing for Mobile Ad Hoc Networks,” IEEE Communications Surveys and Tutorials, Vol. 7, No. 3, pp. 2-21, Mar. 2005.
[10] T. R. Andel, and A. Yasinsac, "Surveying Security Analysis Techniques in MANET Routing Protocols,” IEEE Communications Surveys and Tutorials, Vol. 9, No. 4, pp. 70-84, Feb. 2007.
[11] A. Pfitzmann, and M. Hansen, "Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology,” Draft, February 2008.
[12] J. Liu, J. Kong, X. Hong, M. Gerla, "Performance Evaluation of Anonymous Routing Protocols in MANETs”, in Proc. IEEE International Conference on Wireless Communications and Networking Conference, Las Vegas, 2006, pp. 646-651, 2006.
[13] J. Kong, X. Hong, and M. Gerla, "An Identity-free and On Demand Routing Scheme against Anonymity Threats in Mobile Ad-hoc Networks,” IEEE Trans. on Mobile Computing, Vol. 6, No. 8, pp. 888-902, Aug. 2007.
[14] D. Kelly, R. Raines, R. Baldwin, M. Grimaila, and B. Mullins, "Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics,” IEEE Communications Surveys and Tutorials, Vol. 14, No. 2, pp. 579-606, Jun. 2012.
[15] D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures,” in Proc. Advances in Cryptology, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3152, pp. 41-55, Aug. 2004.
[16] D. Boneh, and M. Frankliny, "Identity-Based Encryption from the Weil Pairing,” in Proc. Advances in Cryptology, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2139, pp. 586-615, Aug. 2001.
[17] J. Kong, and X. Hong, "ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Adhoc Networks,” in Proc. 4th International Symposium on Mobile Ad Hoc Networking & Computing, New York, 2003, pp. 291-302.
[18] M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous Connections and Onion Routing,” IEEE Journal on Selected Areas in Communications, 16(4), pp. 482-494. Aug. 1998.
[19] K. Jiejun, H. Xiaoyan, M. Y. Sanadidiy, and G. Mario, "Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing,” in Proc. of 10th IEEE Symposium on Computers and Communications, Los Angeles, 2005, pp. 57-62.
[20] S. Seys, and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks,” in Proc. of the International Conference on Advanced Information Networking and Applications, Vienna, 2006, pp. 133-137.
[21] L. Jun, H. Xiaoyan, K. Jiejun, Z. Qunwei, H. Ning, and G. B. Phillip, "A Hierarchical Anonymous Routing Scheme for Mobile Ad-Hoc Networks,” in Proc. International Conference on Military Communication, Washington, 2006, pp. 1-7.
[22] Y. Liu, J. Markus, and W. Susanne, "Discount Anonymous On Demand Routing for Mobile Ad hoc Networks,” in Proc. 2nd International Conference on Security and Privacy in Communication Networks, Baltimore, 2006, pp. 1-10.
[23] Q. Yang, H. Dijiang, and K. Vinayak, "OLAR: On-demand Lightweight Anonymous Routing in MANETs,” in Proc. 4th International Conference on Mobile Computing and Ubiquitous Networking, Tokyo, 2008, pp. 72-79.
[24] P. Jun, and L. Jianhua, "MASR: An Efficient Strong Anonymous Routing Protocol for Mobile Ad Hoc Network,” in Proc. International Conference on Management and Service Science, Wuhan, 2009, pp. 1-6.
[25] L. Xiaoqing, L. Hui, M. Jianfeng, and Z. Weidong, "An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks,” in Proc. 5th International Conference on Information Assurance and Security, Xian, 2009, pp. 287-290.
[26] N. Alireza, M. Ali, M. Dimitris, and O. B. Luis, "Privacy within Pervasive Communications,” Springer Journal on Telecommunication Systems, 40(4-3), pp. 101-116, Oct. 2009.
[27] Jiefeng, B. Roksana, and S. Vijay, "TARo: Trusted Anonymous Routing for MANETs”, in Proc. 8th IEEE International Conference on Embedded and Ubiquitous Computing, Hong Kong, 2010, pp. 756-762.
[28] Tomasz, and K. Zbigniew, "ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks,” 2006.
[29] Z. Yanchao, L. Wei, L. Wenjing, and F. Yuguang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks,” IEEE Trans. On Wireless Communications, 5(9), pp. 2376 – 2385, Sep. 2006.
[30] S. Denh, C. Rex, and B. Lichun, "ODAR: On-Demand Anonymous Routing in Ad Hoc Networks,” in Proc. 3rd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2006, pp. 267-276.
[31] L. Xiaodong, L. Rongxing, Z. Haojin, H. Pin-Han, S. Xuemin, and C. Zhenfu, "ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks,” in Proc. IEEE International Conference on Communications, Glasgow, 2007, pp. 1247-1253.
[32] C. Chao-Chin, S. L. W. David, K. Jay Kuo, and N. Kshirasagar, "An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-hoc Networks,” IEEE Journal on Selected Areas in Communications, 25(1), pp. 192-203, Jan. 2007.
[33] S. Reza, Y. Nasser and K. Ahmad, "Chain-based Anonymous Routing for Wireless Ad Hoc Networks,” in Proc. 4th IEEE International Conference on Consumer Communications and Networking Conference, Las Vegas, 2007, pp. 297-302.
[34] D. Ying, W. C. Tat, O. K. L. Victor, S. M. Yiu, and C. K. Hui, "ARMR: Anonymous Routing Protocol with Multiple Routes for Communications in Mobile Ad Hoc Networks,” Elsevier Journal on Ad Hoc Networks, 7(8), pp. 1536-1550, Apr. 2009.
[35] C. Heesook, E. William, S. Jaesheungn, D. M. Patrick, and F. L. P. Thomas, "ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks,” Wireless Networks, pp. 525-539, May. 2009.
[36] E. D. Karim, and T. Gene, "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,” in IEEE Trans. on Mobile Computing, 10(9), pp. 1345-1358, Jul 2011.
[37] W. Zhiguo, R. Kui, and G. Ming, "USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks,” in IEEE Trans. on Wireless Communications, 11(5), pp. 1922-1932, Mar. 2012.
[38] R. J. Ik, O. K. Jeong, and H. L. Dang, "A Diffie-Hellman Key Exchange Protocol without Random Oracles,” in Proc. 5th International Conference on Cryptology and Network Security, Springer-Verlag Berlin, pp. 37-54, 2006.
[39] D. Johnson, and A. Menezes, "The Elliptic Curve Digital Signature Algorithm (ECDSA)”, Technical Report CORR 99-34, Centre for Applied Cryptographic Research (CACR), University of Waterloo, 1999.